Dynamic encryption system based on all-prime-number library

A dynamic encryption, prime number technology, applied in the field of information security

Inactive Publication Date: 2018-01-30
刘诗章 +1
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is currently no relevant system that can achieve these two main points

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic encryption system based on all-prime-number library
  • Dynamic encryption system based on all-prime-number library
  • Dynamic encryption system based on all-prime-number library

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The large encryption module stores a complete full prime number library. If a special prime number is needed during use, the full prime number library is first screened into a special prime number library. When in use, it is divided into two libraries, one is called standard prime number library A, which is used for backup; the other is called residual prime number library B, which is officially used prime number library. When using for the first time, copy B 1 Library = A library, and B 1 The library is added to the B library, that is, the B library = B 1 Library. Every time a prime number is used, a prime number is randomly selected from the B library and the used prime number is deleted. System real-time record B 1 The remaining prime numbers in the library. When B 1 When the remaining primes in the library are less than the specified ratio k%, the second copy B 2 Library = A library, and B 2 The library is added to the B library, that is, the B library = B 1 Library...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamic encryption system based on an all-prime-number library and the system is suitable for real-time dynamic encryption of data and one-time pad processing of instructiontransmission. The system uses a characteristic of the all-prime-number library to provide a lot of asymmetric secret keys and simultaneously carries out macroscopic management and control on usage ofprime numbers. The prime numbers used by the secret keys are repeatedly used in a low probability, and a probability for the prime numbers to be used repeatedly is greatly reduced. The system completes an encryption transmission process of an integral system through mutual cooperation among large, middle and small encryption modules. During an encryption process, the asymmetric secret keys are mainly used so that the different modules can communicate with each other randomly, correlation information does not need to be stored and there is no connection among encryption communication. All the modules carry out secret key updating in safe time, and the integral system possesses high safety performance.

Description

Technical field [0001] The invention belongs to the field of information security, and particularly relates to a dynamic encryption system based on a full prime number library, which is suitable for real-time dynamic encryption of data and one-time encryption processing of instruction transmission. Background technique [0002] With the development of technology, people's lives have become more convenient. The exchange of information between people is becoming more frequent and easier. At the same time, the accompanying information security issues have become more prominent. Hackers have better equipment and higher technology to steal people's many important information. People's private photos are frequently stolen, bank cards are stolen, and various online accounts are stolen. [0003] For information security issues, various corresponding encryption methods have been proposed. Commonly used algorithms are divided into symmetric algorithms and asymmetric algorithms, each with...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 刘诗章路博超
Owner 刘诗章
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products